EP2809046B1 - Zuordnung unterschiedlicher Sicherheitsmodi mit unterschiedlichen drahtlosen Authenticators - Google Patents

Zuordnung unterschiedlicher Sicherheitsmodi mit unterschiedlichen drahtlosen Authenticators Download PDF

Info

Publication number
EP2809046B1
EP2809046B1 EP14170206.8A EP14170206A EP2809046B1 EP 2809046 B1 EP2809046 B1 EP 2809046B1 EP 14170206 A EP14170206 A EP 14170206A EP 2809046 B1 EP2809046 B1 EP 2809046B1
Authority
EP
European Patent Office
Prior art keywords
security mode
wireless
resources
authenticator
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP14170206.8A
Other languages
English (en)
French (fr)
Other versions
EP2809046A1 (de
Inventor
Neil Patrick Adams
Alexander Sherkin
Surender Kumar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BlackBerry Ltd
Original Assignee
BlackBerry Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BlackBerry Ltd filed Critical BlackBerry Ltd
Publication of EP2809046A1 publication Critical patent/EP2809046A1/de
Application granted granted Critical
Publication of EP2809046B1 publication Critical patent/EP2809046B1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/086Access security using security domains
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Definitions

  • NFC Near Field Communication
  • RFID Radio Frequency Identification
  • NFC technology enables data exchange between devices at a distance of approximately four to approximately ten centimeters, at rates of approximately 100 kbps.
  • NFC-enabled devices can be made to transfer information between devices by simply placing them near each other. For example, "tapping" or otherwise bringing two NFC-enabled devices within range of each other may cause one or both of the devices to send data to the other device.
  • the interface 106 comprises a proximity-activated wireless interface, for example, NFC interface, Bluetooth interface, or any additional or different types of proximity-activated wireless interfaces.
  • the conditions under which the interface 106 detects proximity of the second or third wireless device 115a, 115b may depend on settings or attributes of the particular wireless device.
  • the interface 106 may detect proximity based on receiving signals having a signal-to-noise ratio greater than a threshold level.
  • the conditions under which proximity can be detected may depend on the physical orientations of the wireless devices, physical attributes of their environment, and other considerations.
  • the information 118a, 118b may be encrypted before communicated to the first device 105.
  • the encryption can provide confidentiality in the data communications between the first device 105 and the second wireless device 115a or the third wireless device 115b.
  • the security modes 114 can comprise, for example, a database that includes a list of security modes, accessibility attributes or security properties of the security modes, or additional or different information as appropriate.
  • a security mode can define accessibility attributes of resources on the first device 105. Based on a particular security mode, the first device can grant or decline external access to certain resources on the first device 105 according to the accessibility attributes.
  • a security mode can include multiple security parameters that define accessibility attributes of the resources on the first device 105.
  • the accessibility attributes can include one or more of a timeout attribute, an authentication attribute, a resource attribute, or any additional or different types of attribute.
  • the example second wireless device 115a and the example third wireless device 115b shown in FIG. 1 include encoded information 116a and encoded information 116b, respectively.
  • the example second wireless device 115a and third wireless device 115b may include additional or different components, for example, a processor, a memory, an interface, or any other appropriate module or apparatus.
  • the second wireless device 115a and the third wireless device 115b each may include a single digital or analog circuitry with appropriate memory, processor, interface, software, hardware, firmware or a combination of these and other types of apparatus.
  • the second wireless device 115a and the third wireless device 115b can have identical, similar, or different structures or configurations.
  • the identifier may include information that identifies one or more of a security mode (e.g., a security mode of the first device 105), device (e.g., the second wireless device 115a or the third wireless device 115b), location, address, component, and user of a device, or any attribute of the device, security mode, location, address, component, and user of the device.
  • the link can be a link to content accessible by the Internet, a link to content accessible on a local area network, a link to content stored on a device (e.g., device 105, 115a, or 115b) or another type of link. In some instances, the link can be in the form of a uniform resource locator (URL).
  • URL uniform resource locator
  • the second wireless device 115a, the third wireless device 115b, or both can be devices or articles attached with QR codes.
  • each of the QR codes can encode information that can be associated to a distinct security mode on the first device 105.
  • the authentication module 112 may identify corresponding security mode information based on the QR codes, and apply the corresponding decoded security mode on the first device 105. Additional or different operations can be performed before, during, or after the interactions between the first device 105 and the second wireless device 115a or the third wireless device 115b.
  • the second wireless device 115a or the third wireless device 115b can comprise any other type of appropriate devices or articles (e.g., a fob, a card, a key, a token, etc.) with encoded authentication information (e.g., a barcode, an identifier, or any other type of machine-readable representation of data).
  • the first device 105 can include an appropriate interface (e.g., the interface 106) facilitating interactions and communications between the first device 105 and the second wireless device 115a or the third wireless device 115b.
  • multiple security modes of the first device may be paired or otherwise associated with the respective wireless authenticator device.
  • the associating can be made based on, for example, a location of the respective wireless authenticator device, a type of user to whom the respective wireless authenticator device is assigned, or any other appropriate criterion.
  • the multiple security modes may include a game security mode, a child security mode, a home security mode, a work security mode, or another security mode.
  • a wireless authenticator assigned to a child can be associated with a child security mode, where the child can only access certain resources (e.g., content, applications, data, etc.) in the first device for a certain amount of time configured by the child's parent for instance.
  • the second security mode is applied in the first device.
  • the first device can apply the second security mode by securing the resources of the first device according to the accessibility attributes (e.g., a timeout attribute, an authentication attribute, a resource attribute, etc.) defined in the second security mode.
  • the accessibility attributes e.g., a timeout attribute, an authentication attribute, a resource attribute, etc.
  • the first device can secure the resources according to the second security mode for the time duration indicated by the timeout attribute.
  • the second security mode includes an authentication attribute
  • the first device can secure the resources according to the second security mode by requesting for the authentication mechanism as indicated in the authentication attribute and verifying receipt of the authentication mechanism before allowing the resources to be accessed external to the first device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Claims (14)

  1. Authentifizierungsverfahren mit:
    Erfassen (306) von Information (116a, 116b), die in einer Drahtlosauthentifizierervorrichtung (115a, 115b) codiert ist, an einer ersten Vorrichtung (105) auf der Grundlage einer Drahtlosinteraktion zwischen der ersten Vorrichtung und der Drahtlosauthentifizierervorrichtung, wobei die erste Vorrichtung die Information erfasst (306), die in der Drahtlosauthentifizierervorrichtung codiert ist, während sie Ressourcen auf der ersten Vorrichtung nach einem ersten Sicherheitsmodus schützt (304),
    Auswählen (308) eines zweiten Sicherheitsmodus, der mit der Drahtlosauthentifizierervorrichtung verknüpft ist, auf der Grundlage des Erfassens der Information, wobei der zweite Sicherheitsmodus einen aus einer Vielzahl von verschiedenen Sicherheitsmodi (114) aufweist, wobei jeder der Vielzahl von verschiedenen Sicherheitsmodi mit einerjeweiligen aus einer Vielzahl von Drahtlosauthentifizierervorrichtungen verknüpft ist und Zugreifbarkeitsattribute der Ressourcen für die erste Vorrichtung festlegt, dadurch gekennzeichnet, dass mindestens der zweite Sicherheitsmodus ein Authentifizierungsattribut festlegt, das einen Authentifizierungsmechanismus angibt, der benötigt wird, bevor erlaubt wird, dass auf die Ressourcen von außerhalb der ersten Vorrichtung zugegriffen werden kann,
    Anwenden (310) des ausgewählten zweiten Sicherheitsmodus auf der ersten Vorrichtung und
    Verifizieren eines Empfangs des Authentifizierungsmechanismus, bevor erlaubt wird, dass auf die Ressourcen von außerhalb der ersten Vorrichtung zugegriffen werden kann,
    wobei der Authentifizierungsmechanismus mindestens zum Teil auf der Grundlage eines Ortes der Drahtlosauthentifizierervorrichtung konfiguriert ist.
  2. Authentifizierungsverfahren nach Anspruch 1, wobei der Authentifizierungsmechanismus mindestens zum Teil auf der Grundlage einer Autoritätsstufe eines Benutzers der ersten Vorrichtung konfiguriert ist.
  3. Authentifizierungsverfahren nach Anspruch 1 oder 2, wobei der Authentifizierungsmechanismus eines oder mehrere aus einer persönlichen Identifikationsnummer, einem Passwort, einem Schnellantworts- bzw. Quick-Response-Code, einem Barcode, einem grafischen Authentifizierer, einer Geste, biometrischen Daten oder einer weiteren Authentifizierervorrichtung enthält.
  4. Authentifizierungsverfahren nach einem der vorhergehenden Ansprüche, ferner mit Verknüpfen (302) jedes der Vielzahl von verschiedenen Sicherheitsmodi (114) mit der jeweiligen der Vielzahl von verschiedenen Drahtlosauthentifizierervorrichtungen (115a, 115b).
  5. Authentifizierungsverfahren nach Anspruch 4, wobei das Verknüpfen jedes der Vielzahl von verschiedenen Sicherheitsmodi (114) mit derjeweiligen der Vielzahl von verschiedenen Drahtlosauthentifizierervorrichtungen zumindest zum Teil auf einen Ort derjeweiligen der Vielzahl von verschiedenen Drahtlosauthentifizierervorrichtungen basiert.
  6. Authentifizierungsverfahren nach einem der vorhergehenden Ansprüche, wobei die Sicherheitsmodi (114) einen oder mehrere aus einem Spielsicherheitsmodus, einem Kindersicherheitsmodus, einem Heimsicherheitsmodus oder einem Arbeitssicherheitsmodus aufweisen.
  7. Authentifizierungsverfahren nach einem der vorhergehenden Ansprüche, wobei auf die Ressourcen von außerhalb der ersten Vorrichtung nicht zugegriffen werden kann, wenn die Ressourcen nach dem ersten Sicherheitsmodus geschützt sind, und nach Anwenden des ausgewählten zweiten Sicherheitsmodus von außerhalb der ersten Vorrichtung auf die Ressourcen zugegriffen werden kann.
  8. Authentifizierungsverfahren nach einem der vorhergehenden Ansprüche, wobei der zweite Sicherheitsmodus ein Auszeitattribut festlegt, wobei das Auszeitattribut einen Zeitparameter zum Schützen der Ressourcen nach dem zweiten Sicherheitsmodus angibt, und das Verfahren ferner ein Schützen der Ressourcen auf der ersten Vorrichtung nach dem zweiten Sicherheitsmodus und ferner nach dem Auszeitattribut aufweist.
  9. Authentifizierungsverfahren nach Anspruch 8, wobei der Zeitparameter eine oder mehrere Zeitperioden von einem Tag festlegt.
  10. Authentifizierungsverfahren nach einem der vorhergehenden Ansprüche, wobei der zweite Sicherheitsmodus eine Untermenge von Ressourcen festlegt, auf die von außerhalb der ersten Vorrichtung zugegriffen werden kann, wenn die Ressourcen nach dem zweiten Sicherheitsmodus geschützt sind, und das Verfahren ein Bereitstellen von Zugriff auf die Untermenge der Ressourcen aufweist, während ein Zugriff auf andere Ressourcen auf der ersten Vorrichtung verhindert wird.
  11. Authentifizierungsverfahren nach Anspruch 10, wobei die Untermenge mindestens eines aus einem Perimeter, einer Anwendung, einer Datei oder einer Netzressource enthält.
  12. Authentifizierungsverfahren nach einem der vorhergehenden Ansprüche, wobei das Erfassen von Information, die in der Drahtlosauthentifizierervorrichtung codiert ist, ein Erfassen einer Nähe der Drahtlosauthentifizierervorrichtung aufweist.
  13. Ein oder mehrere computerlesbare Medien mit Anweisungen, die von einem oder mehreren datenverarbeitenden Geräten ausführbar sind, um das Verfahren nach einem der vorhergehenden Ansprüche durchzuführen.
  14. Vorrichtung, die dazu konfiguriert ist, das Verfahren nach einem der Ansprüche 1 bis 12 durchzuführen.
EP14170206.8A 2013-05-29 2014-05-28 Zuordnung unterschiedlicher Sicherheitsmodi mit unterschiedlichen drahtlosen Authenticators Active EP2809046B1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/904,698 US9552472B2 (en) 2013-05-29 2013-05-29 Associating distinct security modes with distinct wireless authenticators

Publications (2)

Publication Number Publication Date
EP2809046A1 EP2809046A1 (de) 2014-12-03
EP2809046B1 true EP2809046B1 (de) 2017-02-22

Family

ID=50927912

Family Applications (1)

Application Number Title Priority Date Filing Date
EP14170206.8A Active EP2809046B1 (de) 2013-05-29 2014-05-28 Zuordnung unterschiedlicher Sicherheitsmodi mit unterschiedlichen drahtlosen Authenticators

Country Status (2)

Country Link
US (1) US9552472B2 (de)
EP (1) EP2809046B1 (de)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140358552A1 (en) * 2013-05-31 2014-12-04 Cirrus Logic, Inc. Low-power voice gate for device wake-up
KR20150049596A (ko) * 2013-10-30 2015-05-08 삼성전자주식회사 보안 입력 방법 및 그 전자 장치
US9992327B1 (en) * 2014-01-03 2018-06-05 Amazon Technologies, Inc. Interaction lock mode for mobile devices
US9692879B1 (en) 2014-05-20 2017-06-27 Invincea, Inc. Methods and devices for secure authentication to a compute device
CN111031033B (zh) * 2014-06-13 2022-08-16 柏思科技有限公司 用于管理节点的方法和系统
US9697385B2 (en) 2014-06-20 2017-07-04 Google Inc. Security adjustments in mobile devices
CN105488869A (zh) * 2014-09-16 2016-04-13 深圳富泰宏精密工业有限公司 密码锁开锁系统及方法
US10333980B2 (en) 2014-11-19 2019-06-25 Imprivata, Inc. Personal device network for user identification and authentication
US9699594B2 (en) * 2015-02-27 2017-07-04 Plantronics, Inc. Mobile user device and method of communication over a wireless medium
EP3289792B1 (de) 2015-05-01 2020-06-24 Assa Abloy AB Kontinuierliche authentifizierung
JP2016224522A (ja) * 2015-05-27 2016-12-28 京セラ株式会社 端末装置およびサービスサーバ
US9813402B1 (en) * 2016-01-08 2017-11-07 Allstate Insurance Company User authentication based on probabilistic inference of threat source
US20180122217A1 (en) * 2016-10-27 2018-05-03 Lenovo (Singapore) Pte. Ltd. Detecting Wireless Signals to Engage Security System Awareness
CN107392056A (zh) * 2017-07-31 2017-11-24 广东欧珀移动通信有限公司 终端及儿童模式实现方法、计算机可读存储介质
US20190069436A1 (en) * 2017-08-23 2019-02-28 Hewlett Packard Enterprise Development Lp Locking mechanism of a module of a data center
FR3100635B1 (fr) * 2019-09-10 2021-08-06 Schneider Electric Ind Sas Système de sécurisation d’un dispositif

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7428411B2 (en) * 2000-12-19 2008-09-23 At&T Delaware Intellectual Property, Inc. Location-based security rules
US20020123325A1 (en) 2001-03-01 2002-09-05 Cooper Gerald M. Method and apparatus for increasing the security of wireless data services
US7400878B2 (en) 2004-02-26 2008-07-15 Research In Motion Limited Computing device with environment aware features
CN1969579A (zh) * 2004-06-10 2007-05-23 松下电器产业株式会社 从rfid标签接收数据的移动终端及移动终端的控制策略确定方法
JP4363361B2 (ja) * 2005-04-28 2009-11-11 沖電気工業株式会社 携帯用電子機器,セキュリティシステムおよび携帯用電子機器の動作許可範囲決定方法
US8078990B2 (en) 2006-02-01 2011-12-13 Research In Motion Limited Secure device sharing
EP1895750B1 (de) 2006-09-01 2010-06-16 Research In Motion Limited Verfahren zur ortsabhängigen Sperrung von Funktionen eines Mobilfunkendgerätes, und Vorrichtung dafür
US7742995B2 (en) 2007-03-23 2010-06-22 Mastercard International, Inc. Pre-authenticated identification token
EP2182493A1 (de) 2008-11-04 2010-05-05 Gemalto SA Remote-Benutzerauthentifizierung mit NFC
EP2378748B1 (de) 2010-02-26 2018-04-11 BlackBerry Limited Drahtloses Kommunikationssystem mit mobiler Umleitung zur Mobilgerätauthentifizierung basierend einer vom Benutzer tragbaren Sicherheitsvorrichtung und zugehörige Verfahren
EP2364004A1 (de) 2010-02-26 2011-09-07 Research In Motion Limited Kommunikationsvorrichtung, die auf Nahfeldkommunikationen reagiert, um auf gesperrte und nicht gesperrte Betriebsmodi zuzugreifen
EP2364006B1 (de) 2010-02-26 2013-06-19 Research In Motion Limited Nahfeldkommunikationssystem mit mobilen drahtlosen Kommunikationsvorrichtungsfunktionen basierend auf Zeitpunkt und Sequenz der NFC-Sensorkommunikation und zugehörige Verfahren
CA2811839C (en) 2010-09-24 2017-09-05 Research In Motion Limited Method and apparatus for differentiated access control
EP2442600B1 (de) 2010-10-14 2013-03-06 Research In Motion Limited Nahfeldkommunikationssystem mit Bereitstellung der geografischen Authentifizierung der Position eines Nahfeldkommunikationsetiketts und zugehörige Verfahren
AU2011202832B2 (en) 2010-12-21 2013-01-24 Lg Electronics Inc. Mobile terminal and method of controlling a mode switching therein
US8929861B2 (en) 2011-02-24 2015-01-06 Blackberry Limited Personnel access system with verification features utilizing near field communication (NFC) and related methods
US8509808B2 (en) * 2011-03-29 2013-08-13 Research In Motion Limited Mobile wireless communications device having a near field communication (NFC) device and providing memory disabling and related
US10223743B2 (en) 2011-03-29 2019-03-05 Blackberry Limited Communication system providing near field communication (NFC) transaction features and related methods
EP2506203B1 (de) 2011-03-29 2013-06-19 Research In Motion Limited Kommunikationssystem mit Nahfeldkommunikationstransaktionsmerkmalen und zugehörige Verfahren
US20120329388A1 (en) 2011-06-27 2012-12-27 Broadcom Corporation NFC-Enabled Devices to Store and Retrieve Portable Application-Specific Personal Information for Use with Computational Platforms
EP2732651B1 (de) 2011-07-11 2018-09-05 BlackBerry Limited Datenintegrität für die nähebasierte kommunikation
CA2841063C (en) 2011-07-11 2018-04-03 Blackberry Limited Data integrity for proximity-based communication
US20130040561A1 (en) * 2011-08-12 2013-02-14 Ivo Conde e Silva System and method for launching and/or downloading applications with near field communication tags
US8624725B1 (en) * 2011-09-22 2014-01-07 Amazon Technologies, Inc. Enhanced guidance for electronic devices having multiple tracking modes
US9778837B2 (en) * 2013-03-15 2017-10-03 Apple Inc. Mobile computing device with multiple access modes

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None *

Also Published As

Publication number Publication date
EP2809046A1 (de) 2014-12-03
US20140359750A1 (en) 2014-12-04
US9552472B2 (en) 2017-01-24

Similar Documents

Publication Publication Date Title
EP2809046B1 (de) Zuordnung unterschiedlicher Sicherheitsmodi mit unterschiedlichen drahtlosen Authenticators
CN110463161B (zh) 用于访问受保护资源的口令状态机
US10447839B2 (en) Device locator disable authentication
US11093626B2 (en) Security systems and methods for continuous authorized access to restricted access locations
US20180324166A1 (en) Presence-based credential updating
US10205711B2 (en) Multi-user strong authentication token
US20190130676A1 (en) Configurable digital badge holder
US9706401B2 (en) User-authentication-based approval of a first device via communication with a second device
US8656455B1 (en) Managing data loss prevention policies
US20140282992A1 (en) Systems and methods for securing the boot process of a device using credentials stored on an authentication token
US11038684B2 (en) User authentication using a companion device
EP2696307A1 (de) Systeme und Verfahren zur Steuerung des Benutzerzugriffs auf geschützte Ressourcen unter Verwendung von mehrstufiger Authentifizierung
WO2017112641A1 (en) Dynamic management of protected file access
CA3103468A1 (en) Systems and methods for secure access to property or information using blockchain
EP2927834A1 (de) Informationsverarbeitungsvorrichtung, informationsverarbeitungsverfahren und aufzeichnungsmedium
WO2017112640A1 (en) Obtaining a decryption key from a mobile device
WO2017112639A1 (en) Encrypted synchronization
Yohan et al. Dynamic multi-factor authentication for smartphone
KR20180132811A (ko) 사용자와 모바일 단말기 및 추가 인스턴스 간의 보안 상호 작용을 위한 방법
KR102010764B1 (ko) 스마트폰 인증 기능을 이용한 컴퓨터 보안 시스템 및 방법
Chantal et al. A security analysis and reinforcement design adopting fingerprints over drawbacks of passwords based authentication in remote home automation control system
EP4203535A1 (de) Systeme und verfahren zur gemeinsamen nutzung von berechtigungsnachweisen
CN104468173A (zh) 一种软件系统安全设计的方法
CN105404820A (zh) 文件安全存取系统与方法

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20140528

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

17Q First examination report despatched

Effective date: 20151221

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 29/08 20060101ALN20160809BHEP

Ipc: G06F 21/74 20130101ALN20160809BHEP

Ipc: H04W 4/02 20090101ALN20160809BHEP

Ipc: H04W 4/04 20090101ALI20160809BHEP

Ipc: H04W 12/08 20090101ALI20160809BHEP

Ipc: H04L 29/06 20060101AFI20160809BHEP

Ipc: G06F 21/35 20130101ALI20160809BHEP

Ipc: H04W 12/06 20090101ALN20160809BHEP

INTG Intention to grant announced

Effective date: 20160906

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 870068

Country of ref document: AT

Kind code of ref document: T

Effective date: 20170315

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602014006858

Country of ref document: DE

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 4

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20170222

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 870068

Country of ref document: AT

Kind code of ref document: T

Effective date: 20170222

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170522

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170523

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170522

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170531

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170622

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602014006858

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20171123

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170531

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170528

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20170531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170528

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 5

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170528

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20140528

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170222

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170622

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 602014006858

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: H04L0029060000

Ipc: H04L0065000000

REG Reference to a national code

Ref country code: DE

Ref legal event code: R082

Ref document number: 602014006858

Country of ref document: DE

Ref country code: DE

Ref legal event code: R081

Ref document number: 602014006858

Country of ref document: DE

Owner name: MALIKIE INNOVATIONS LTD., IE

Free format text: FORMER OWNER: BLACKBERRY LIMITED, WATERLOO, ONTARIO, CA

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20240521

Year of fee payment: 11

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20240529

Year of fee payment: 11

REG Reference to a national code

Ref country code: GB

Ref legal event code: 732E

Free format text: REGISTERED BETWEEN 20240620 AND 20240627

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20240527

Year of fee payment: 11